Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop
Main Article Content
Abstract
In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order to avoid misuse by irresponsible people. Therefore, the main objective of this research is to develop the application of the Message Diggest Algorithm (MD5) Cryptography Algorithm in employee data applications. This application is very appropriate to make it easier for companies to manage their employee data and ensure data security. To secure sensitive data from each employee, the process carried out is by encrypting each sensitive data so that it is not easy to read by others who have no interest or authority over the data. And the desktop-based application was made using Visual Basic. The research was carried out with two methods, namely the method to test the compilation speed of MD5 and to test the validation of the decrypted data from the MD5. And from the results of the study, the average speed of 500-515 milliseconds and data consistency obtained valid results from all tests.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to JTIK journal and Research Division, KITA Institute as the publisher of the journal. Copyright encompasses rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations.
JTIK journal and Research Division, KITA Institute and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in JTIK journal are the sole and exclusive responsibility of their respective authors and advertisers.
The Copyright Transfer Form can be downloaded here: [Copyright Transfer Form JTIK]. The copyright form should be signed originally and send to the Editorial Office in the form of original mail, scanned document or fax :
Muhammad Wali (Editor-in-Chief)
Editorial Office of Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)
Research Division, KITA Institute
Teuku Nyak Arief Street Nomor : 7b, Lamnyong, Lamgugop, Kota Banda Aceh
Telp./Fax: 0651-8070141
Email: jtik@lembagakita.org - journal@lembagakita.org
References
Ardyanto Pamungkas, 2006. Implementasi Algoritma MD5, Sha1, Dan RC4 Untuk Sistem Kriptografi Pada Aplikasi Mobile Internet Berbasis Java. URL: www.tcpdf.org.
Layuk, N.S., 2017, August. Pemanfaatan enkripsi md5 pada keamanan login sistem informasi manufaktur pt. Maruki international indonesia. In SISITI: Seminar Ilmiah Sistem Informasi dan Teknologi Informasi (Vol. 5, No. 1).
S. Bahri, Diana, and S. D. PS, 2012. Studi Dan Implementasi Pengamanan Basis Data Menggunakan Metode Enkripsi MD5 (Message-Digest Algorihm 5), J. Ilm., Vol. 5(5), pp. 1–15.
Sofwan, A. and Susanto, T., 2006. Aplikasi Kriptografi Dengan Algoritma Message Digest 5 (Md5). Transmisi, 8(1), pp.22-27.
Sumarno, S., 2018. Analisis Kinerja Kombinasi Algoritma Message-Digest Algortihm 5 (MD5), Rivest Shamir Adleman (RSA) dan Rivest Cipher 4 (RC4) Pada Keamanan E-Dokumen. Jurnal Sistem Informasi dan Ilmu Komputer Prima (JUSIKOM PRIMA), 2(1).
Prasetyo, T.F. and Hikmawan, A., 2016. Analisis Perbandingan Dan Implementasi Sistem Keamanan Data Menggunakan Metode Enkripsi RC4 SHA Dan MD5. Infotech J, 2(1), p.236705.
Hayati, N., Budiman, M.A. and Sharif, A., 2017. Implementasi Algoritma RC4A dan MD5 untuk menjamin Confidentiality dan integrity pada file teks. SinkrOn, 1(2).
Qashlim, A., 2016. Implementasi Algoritma MD5 Untuk Keamanan Dokumen. Jurnal Ilmiah Ilmu Komputer Fakultas Ilmu Komputer Universitas Al Asyariah Mandar, 2(2), pp.10-15.
SUTARNO, S.R.A., Mulya, M. and Marieska, M.D., 2020. Pengamanan Integritas dan Otentikasi Data Pelanggan pada Sistem PT. Pos Indonesia menggunakan Algoritma MD5 (Doctoral dissertation, Sriwijaya University).
Pattiasina, T.J. and Lysandra, A., 2013. Studi Literatur Kriptografi Dengan Algoritma Message Digest 5 (MD5). Teknika, 2(1), pp.59-69.
Zein, Z. and Adil, A., 2016. Aplikasi Media Bantu Pembelajaran Kriptografi Dengan Menggunakan Algoritma Message Digest 5 (MD5). MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, pp.45-51.
Nasrudin, K., 2018. Penerapan Enkripsi Data Menggunakan Metode Kolaborasi Message Digest Algorithm 5 (Md5) Dan Sha3 Dengan Salt Function Pada Sistem Informasi Penjualan Dan Pembelian (Doctoral dissertation, UNNES).
Ginting, A.B.C., 2017. Perbandingan Algoritma Message Diggest 5 (MD5) dan SHA256 pada Hashing File Dokumen. J. Tek. Inform. Kaputama, Vol 1 (1), pp. 50–61.
Khairina, D.M., 2016. Analisis Keamanan Sistem Login. Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, 6(2), pp.64-67.
Sibyan, H., 2017. Implementasi Enkripsi Basis Data Dengan Algoritma Md5 (Message Digest Algorithm 5) dan Vigenere Cipher. Jurnal Penelitian dan Pengabdian Kepada Masyarakat UNSIQ, 4(1), pp.114-121.